CYBER-TECH
ENGINEERING
CYBER-TECH ENGINEERING SOTERIA ACADEMIES SOLUTION

Establishment of official cyber academic institute and programs facilitating Soteria’s unique training and learning methods and granting official cyber security BSc and MSc degrees over the course of a comprehensive, hands-on 1 to 3 years academic programs.

Solution
Benefits
Complete Establishment

Partners with Soteria best practical solution for cyber security BSc and MSc programs.

Leaders Innovation

Developed operationally, pedagogically and technologically by leaders in their fields.

Real Experience

Hands-on experience operating in real-world cyber operational environments.

Track performance

Platforms and environment sustaining a continuous learning and improvement process of the students and instructors.

Talent Nurturing

Exposing talented and creative individuals to potential employers giving them the opportunity to fulfill critical roles in the cyber arena.

Custom Environment

Tailor-made cyber challenges comprised of real-world scenarios according to regional locations and assets making trainees sympathize with their missions.

Versatile Operation

The facilities and rooms are easily modified and can be used for research and development programs in the cyber and IT arenas.

UPON COMPLETION

Graduates will gain official cyber security degree, practical knowledge and skills – prepared for real-world professions.

MSc, BSc
in cyber-security
Cyber Operations Management
  • SOC managers
  • SOC threat hunters
  • Incident response managers
  • Forensic experts
  • CISO
UPON COMPLETION

Providing graduates with the required knowledge and skills to take a variety of positions in the large-scale of cyber security monitoring and response operations.

Cyber Intelligence
  • WEBINT Analysts manager
  • Social Engineering Specialist
  • Social Media expert
  • Senior Cyber-WEBINT investigators
  • Social media campaign architect
  • Avatar manager and operator
UPON COMPLETION

Capable of leading large scale challenging assignments and laying the ground for any cyber operation or post attack investigations.

Computers Network Operations
  • Ethical hackers / Pen testers experts
  • Vulnerabilities Researchers
  • Exploit team managers
  • Research and development team leaders
  • Web apps research and development team leaders
  • Reverse engineering experts
UPON COMPLETION

Experts in PenTesting and cyber security assessment – breaching organizational networks, revealing their weaknesses, and suggesting corrective actions and modifications.

Information and Network Security
  • Investigation and forensics specialists
  • Network diagnostics team leaders
  • Cyber security experts
  • Malware analyst and Reverse engineers
  • Cyber IT and communication assessment experts
UPON COMPLETION

Graduates think “digitally”, effective team-players combining practical (hands-on) knowledge and out-of-the-box thinking to assess, patch and resolve information security gaps, protect and secure digital data networks.

TRAINING CYBER PROFESSIONALS
Cyber Operations Management
  • SOC managers
  • SOC threat hunters
  • Incident response managers
  • Forensic experts
  • CISO
Cyber Intelligence
  • WEBINT Analysts manager
  • Social Engineering Specialist
  • Social Media expert
  • Senior Cyber-WEBINT investigators
  • Social media campaign architect
  • Avatar manager and operator
Computer Network Operations
  • Ethical hackers
  • Pen testers
  • Vulnerabilities Researchers
  • Exploit team managers
  • Research and development team leaders
  • Web apps research and development team leaders
  • Reverse engineering experts
Information and Network Security
  • Investigation and forensics specialists
  • Network diagnostics team leaders
  • Cyber security experts
  • Malware analyst and Reverse engineers
  • Cyber IT and communication assessment experts